0% found this document useful (0 votes)
24 views7 pages

Cyber Security

Uploaded by

vidhisurwade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views7 pages

Cyber Security

Uploaded by

vidhisurwade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

CYBER SECURITY

VIDHI SURWADE
STD:11TH C
ROLL NO: 42
INTRODUCTION

 Cyber security is the


practice of defending
computers, servers, mobile
devices, electronic systems,
networks, and data from
malicious attacks. It's also
known as information
technology security or
electronic information
security. The term applies
in a variety of contexts,
from business to mobile
computing, and can be
divided into a few common
categories.
WHAT IS…….?

 Network security is the practice of securing a computer network from


intruders, whether targeted attackers or opportunistic malware.
 Application security focuses on keeping software and devices free of
threats. A compromised application could provide access to the data its
designed to protect. Successful security begins in the design stage, well
before a program or device is deployed.
 Information security protects the integrity and privacy of data, both in
storage and in transit.
 Operational security includes the processes and decisions for
handling and protecting data assets. The permissions users have when
accessing a network and the procedures that determine how and where
data may be stored or shared all fall under this umbrella.
CYBER CRIME!!

 Cybercrime is criminal activity


that either targets or uses a
computer, a computer network
or a networked device. Most
cybercrime is committed by
cybercriminals or hackers who
want to make money.
However, occasionally
cybercrime aims to damage
computers or networks for
reasons other than profit.
These could be political or
personal.
CYBER CRIME INCLUDES!!

• Email and internet fraud


• Identity fraud (where personal information is stolen and used)
• Theft of financial or card payment data
• Theft and sale of corporate data
• Cyberextortion (demanding money to prevent a threatened attack)
• Ransomware attacks (a type of cyberextortion)
• Social engineering
• Software vulnerability exploits
HOW CAN WE PROTECT?

 Read privacy policy carefully when you submit the data


through internet.
 Encryption: lots of website uses SSL (secure socket layer)
to encrypt a data.
 Disable remote connectivity.
HISTORY

1940s: The time before crime


1950s: The phone phreaks
1960s: All quiet on the Western Front
1970s: Computer security is born
1980s: From ARPANET to internet
1990s: The world goes online
2000s: Threats diversify and multiply
2010s: The next generation

You might also like